Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16229

Опубликовано: 26 фев. 2018
Источник: debian

Описание

In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-oxfixed2.8.2-1package
ruby-oxno-dsastretchpackage
ruby-oxno-dsajessiepackage

Примечания

  • https://github.com/ohler55/ox/issues/195

  • https://github.com/ohler55/ox/pull/196

  • https://github.com/ohler55/ox/commit/0708ae44faf2ffc3d9330daf6ae023859a8b168b

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 8 лет назад

In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.

CVSS3: 5.5
nvd
почти 8 лет назад

In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the read_from_str function in sax_buf.c when a crafted input is supplied to sax_parse.

CVSS3: 5.5
github
почти 8 лет назад

Ox gem stack overflow in sax_parse